Authenticity means establishing a user’s identity beyond reasonable doubt. Authenticating the user
is crucial in many scenarios, particularly in business and legal matters. A simple example of authentication is
a user login to a network. A more advanced example would be the use of encrypted digital signatures in a
business transaction or the use of watermarking on digital photographs.
notes:
What is Authenticity
The goal of computer authentication is to identify the user and to verify that he has access to a computer system. Computer authentication methods have been widespread since the personal computer was developed in the 1970s. Many authentication methods model physical methods that have been in use for centuries, such as identity cards, visual authentication and passwords. Breaches in computer authentication methods or in physical access controls comprise some of the most devastating attacks against information technology systems.
Ways to Authenticate - Passwords - Bio-metrics - Smart Cards or PKI's - Knowledge Based Authentication
An authenticator is a way to prove to a computer system that you really are who you are (called authentication). It is either:
A piece of data (often called a token) that you got from the last place where you proved who you are (to save you, or the software, the hassle of logging in again).
Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. For more go to:http://en.wikipedia.org/wiki/Fingerprint_recognition (kasper)
A virtual private network (VPN) is a technology for using the Internet or another intermediate network to connect computers to isolated remote computer networks that would otherwise be inaccessible. For more go to:http://en.wikipedia.org/wiki/Virtual_private_network (Kasper)
IB Definition
Authenticity means establishing a user’s identity beyond reasonable doubt. Authenticating the user
is crucial in many scenarios, particularly in business and legal matters. A simple example of authentication is
a user login to a network. A more advanced example would be the use of encrypted digital signatures in a
business transaction or the use of watermarking on digital photographs.
notes:
What is Authenticity
The goal of computer authentication is to identify the user and to verify that he has access to a computer system.Computer authentication methods have been widespread since the personal computer was developed in the 1970s.
Many authentication methods model physical methods that have been in use for centuries, such as identity cards,
visual authentication and passwords. Breaches in computer authentication methods or in physical access controls
comprise some of the most devastating attacks against information technology systems.
Ways to Authenticate
- Passwords
- Bio-metrics
- Smart Cards or PKI's
- Knowledge Based Authentication
Read more: Computer Authentication Methods | eHow.com http://www.ehow.com/list_6704281_computer-authentication-methods.html#ixzz26ttMYgoV
An authenticator is a way to prove to a computer system that you really are who you are (called authentication). It is either:
Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. For more go to:http://en.wikipedia.org/wiki/Fingerprint_recognition (kasper)
Computer authentication methods:
Passwords
PKI (public Key infrastructure) and smart cards
Knowledge-- based authentication
Biometrics
For more details go to: http://www.ehow.com/list_6704281_computer-authentication-methods.html (kasper)
A virtual private network (VPN) is a technology for using the Internet or another intermediate network to connect computers to isolated remote computer networks that would otherwise be inaccessible. For more go to: http://en.wikipedia.org/wiki/Virtual_private_network (Kasper)
Web Authentication types:
HTTP Basic authentication
HTTP Digest authentication
HTTPS Client authentication
Form based authentication
For more details go to: http://www.ehow.com/list_6659435_authentication-types.html (kasper)
For more go to: https://www.globalsign.com/ssl-information-center/what-is-an-ssl-certificate-vid.html?utm_expid=53444151-5&utm_referrer=http%3A%2F%2Fishitgs.wikispaces.com%2F1.5%2BAuthenticity (kasper)
Biometrics:
Hyperlinks:
http://en.wikipedia.org/wiki/Fingerprint_recognition (Kasper)
http://www.ehow.com/list_6704281_computer-authentication-methods.html (Kasper)
http://en.wikipedia.org/wiki/Virtual_private_network (Kasper)
http://www.ehow.com/list_6659435_authentication-types.html (Kasper)
https://www.globalsign.com/ssl-information-center/what-is-an-ssl-certificate.html (Kasper)
Hl examples:
http://aftermathnews.wordpress.com/2008/08/10/%E2%80%98fakeproof%E2%80%99-e-passport-is-cloned-in-minutes/
http://www.bbc.com/news/technology-19274341